Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption

被引:34
作者
Bokefode, Jayant D. [1 ]
Bhise, Avdhut S. [2 ]
Satarkar, Prajakta A. [1 ]
Modani, Dattatray G. [3 ]
机构
[1] Solapur Univ, SVERIs Coll Engn, Pandharpur, India
[2] SVERIs Coll Engn Poly, Pandharpur, India
[3] Mumbai Univ, Gharda Inst Technol, Lavel, Chiplun, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Cryptography; Cloud Security; IoT; Role Based Access Control Model; Sensors;
D O I
10.1016/j.procs.2016.06.007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. The Internet of Things (IoT) is an atmosphere in which all physical objects, peoples or animals are having unique identity and they are able to transfer data over a network without any interaction. An improvement in electronic sensing devices and rapid growth in communication infrastructure, and their monitoring systems give very fast access to retrieve data and allow communication with physical devices. Now days, Organizations use IoT devices to collect real time and continuous data and make better business decisions to increase customer satisfaction. But collected data need to be processed and transferred in appropriate format to store on storage system - which is triggering organizations to rethink their data storage infrastructures. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. The proposed work allows the organization to store the IoT data on the cloud securely by applying different Access control policies and the cryptography concepts. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:43 / 50
页数:8
相关论文
共 21 条
[1]  
[Anonymous], COMMUNICATION ACM
[2]  
[Anonymous], ANAL DATA SECURITY R
[3]  
Bokefode J. D., 2014, INT J COMPUTER APPL, V104
[4]  
Daemen J., 2001, DR DOBBS J
[5]  
Davis R. M., 1978, IEEE Communications Society Magazine, V16, P5, DOI 10.1109/MCOM.1978.1089771
[6]  
Ferraiolo D.F., 1992, 15 NATL COMPUTER SEC, P554
[7]  
Fisher Daniel K., 2014, ADV INTERNET THINGS, V4, P46, DOI [10.4236/ait.2014.44007, DOI 10.4236/AIT.2014.44007]
[8]  
Harfoushi O., 2014, Communications and Network, V6, P15, DOI [DOI 10.4236/CN.2014.61003, 10.4236/cn.2014, DOI 10.4236/CN.2014]
[9]  
Intel, 1979, DEV SOL INT THINGS W
[10]  
Katole B., 2013, Int. J. Eng. Sci, V3, P24, DOI [10.4028/www.scientific.net/amm.303-306.2144, DOI 10.4028/WWW.SCIENTIFIC.NET/AMM.303-306.2144]